Filtering by content type: Plain Language Guidance
Use recognized practices.
Authenticate and control access.
Implement secure data management.
Monitor and adress security risks.
Create a culture of security.
A GUIDE FOR BUSINESS AND PARENTS AND SMALL ENTITY COMPLIANCE GUIDEThe following FAQs are intended to supplement the compliance materials available on the FTC website. In addition, you may send questions or comments to the FTC staff’s COPPA mailbox, CoppaHotLine@ftc.gov.
You just learned that your business experienced a data breach. Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company’s website, you are probably wondering what to do next....
For businesses, the key to safeguarding sensitive information is to start with security. The Start with Security brochure and videos released in 2015 offer practical tips to take from the FTC’s 60+ data security cases.
The Fair Credit Reporting Act (FCRA) spells out rights for victims of identity theft, as well as responsibilities for businesses. Identity theft victims are entitled to ask businesses for a copy of transaction records — such as applications for credit — relating to the theft of their...
More than a thousand new apps are hitting the market each day. In this fast-moving era of entrepreneurship and creativity, is security keeping up? Apps and devices often rely on consumer data — including contact information, photos, and location to name a few — and can be vulnerable...
A continuación se listan algunos conceptos básicos de computación útiles para su compañía, incluso si usted es el único empleado. Si tiene empleados, capacítelos para que sigan estas recomendaciones. Si recolecta algún tipo de información de consumidores, también consulte nuestros...
Here are a few computer security basics to help your company, even if you’re the only employee. If you have employees, train them to follow these tips. If you collect any consumer information, also check out our advice about protecting personal information.
Does your business collect and share consumer health information? When it comes to privacy, you’ve probably thought about the Health Insurance Portability and Accountability Act (HIPAA). But did you know that you also need to comply with the Federal Trade Commission (FTC) Act? This...
Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.
This information often is necessary to fill orders, meet payroll, or perform other necessary business functions...
When is a tenant background screening company a “consumer reporting agency”?
When is an employment background screening company a “consumer reporting agency”?
Start with Security: A Guide for Business offers tips for any business wanting to implement sound data security. For health app developers, here’s tailored advice and additional questions to ask.
What Are the Laws?
Which Laws Apply to My Mobile Heath App?
When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information...
For savvy companies, keeping data secure is a day-to-day part of their business. They reduce the amount of sensitive information they collect in the first place, keep it secure if there’s a legitimate business need to maintain it, and dispose of it safely when they no longer need it....
Update on the U.S.-EU Safe Harbor Framework
A joint publication of the Equal Employment Opportunity Commission and the Federal Trade Commission